SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

Size: px
Start display at page:

Download "SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT"

Transcription

1 SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, Lappeenranta, Finland Jari Porras Lappeenranta University of Technology P.O. Box 20, Lappeenranta, Finland Pekka Jäppinen Lappeenranta University of Technology P.O. Box 20, Lappeenranta, Finland ABSTRACT Future pervasive computing service platforms are widely used with wireless mobile devices. In such wireless ad hoc and peer-to-peer environments, service discovery plays important role. In addition to functional service discovery protocol, efficient utilization of available network technologies improves the usability of an ad hoc communication system. PeerHood is our peer-to-peer environment, which tries to address these issues. This paper presents the service discovery process in PeerHood. KEYWORDS Service discovery, peer-to-peer, ad hoc networking 1. INTRODUCTION Mobile networks are in a significant role in future service networks. Mobile service networks are not created by duplicating all Internet services, but by selecting suitable ones and by creating new ones to support them. A service platform is required to control the service creation, deployment, control and discovery to enable efficient service operation in mobile networks. The I-Centric Communications platform defined inside the Wireless World Research Forum [1] is such a platform. Tafazolli [2] named peer-to-peer and ad hoc communication as the first requirements for I-centric service platform. This paper will describe PeerHood, our peer-to-peer environment, and especially its service discovery procedures. Service performs some task needed by the user. Mobile Services are services which are used by wireless mobile devices. Mobile communication can be based on infrastructure or it can be ad hoc communication in peer-to-peer manner. Particularly in ad hoc

2 communication, Mobile Services set requirements for service discovery process, placing service discovery protocols in essential position. We start this paper by summarizing related research in service discovery area. General components of a service discovery protocol will be explained and characteristics of existing service discovery protocols compared. Subsequently, we present the general architecture of PeerHood, our Peer-to-Peer environment. The main topic of this paper is to describe the service discovery procedure in PeerHood. This discussion is presented after general description of PeerHood environment. Finally, we give our conclusive remarks. 2. RELATED WORK Considerable amount of research and development has been done in the context of service discovery protocols, mainly for use in wired and infrastructure-based wireless networks. The best known examples of service discovery protocols developed both in the industry and academia are Lookup service of Jini [3], UPnP [4], Bluetooth Service Discovery Protocol [5], Service Location Protocol [6] and UDDI [7]. Zhu et al. [8] have created a common taxonomy for service discovery, and compared service discovery protocols according to components based on this taxonomy. In this taxonomy, 10 different components have been discovered. Naming of services and attributes can be either template-based or template-based and predefined. Division can also be done according to initial communication method - whether it is unicast, multicast or broadcast. Services can be discovered and registered either by querying or based on announcements. In the service discovery infrastructure point of view, certain protocols require service directory, whereas others can operate without a directory. State of service information can be either hard-coded or soft state. The scope of service discovery can be based either on network topologies, user roles or contextual information. Usability of services is often improved or weakened by the chosen service selection method. Automatic service selection based on application-specific service weight simplifies the selection process, but may cause selection of unsuitable services. On the other hand, manual service selection causes the user more inconvenience. Service invocation is done simply by providing service location, defining communication mechanism or even application operations. Service usage is explicitly released or based on leases. Client can keep up with the status of service by receiving notifications from the service, or by explicitly polling it periodically. In [9], authors have discovered three approaches to service interaction. First way of interacting with a discovered service is to download the service component to the client device and execute it on the device. There s no need to maintain connectivity after the service component has been downloaded. Alternative approach for interacting with the discovered service is through a defined interface. The interface component can be downloaded to device like in Jini, or the interface can be defined in the control messages of the service discovery process. Yet another interaction method exists. Emulation can be

3 provided to translate control messages and service responses between the client and the service provider. Bluetooth wireless technology has been developed as an ad hoc wireless technology, and therefore service discovery has been a requirement from the start of the development of the technology. Bluetooth Service Discovery Protocol (SDP) is a part of the main Bluetooth specification [5]. Bluetooth SDP operates on Bluetooth Logical Link Control and Adaptation Protocol layer (L2CAP). SDP can be used to search for specific Bluetooth service or browse services on a specific device or on all remote devices. SDP retrieves service records for each service, including service name, service class, protocol descriptors and profile descriptors. Bluetooth SDP uses unicast as an initial communication method, although usually SDP is run immediately after Bluetooth inquiry process with discovered devices as target addresses, reaching all discoverable and connectable devices in the neighborhood. 3. PEERHOOD ARCHITECTURE The main goal of PeerHood is to provide a communication environment, in which mobile devices act in a peer-to-peer manner [10]. PeerHood helps applications to find remote devices and services and connect to them. Device and service discovery is an essential part of such environment. In order to quickly establish ad hoc connections, PeerHood is constantly monitoring the wireless neighborhood for other PeerHood-enabled devices. Services on each PeerHood device are stored locally on device and service database. Stored information is provided on request for PeerHood applications. In addition to core immediate personal area network (PAN), consisting devices found nearby, PeerHood is designed to enable connections to selected distant remote devices. Using infrastructure networks, e.g. Internet, home, corporate and vehicular area networks, a user can extend his network to cover all his personal services regardless of his location. This approach called Personal Network (PN) has been introduced in [11]. In PeerHood, this approach is supported with the GPRS plugin, which uses GPRS or similar infrastructure network to expand the PeerHood neighborhood. PeerHood architecture can be divided in three separate entities. The PeerHood daemon is the component, which ensures the continuous knowledge about other wireless devices. PeerHood library is the component, which provides applications interface for operations provided by PeerHood. PeerHood library is used both in local communication between application and daemon and between PeerHood applications in different devices. PeerHood plug-ins provide functions specific to the wireless network technologies. Plugins are used by the PeerHood library and the PeerHood daemon. Relationship between different components can be seen in Figure 1, which pictures the PeerHood software architecture.

4 Figure 1 - PeerHood software architecture 3.1 PeerHood daemon Main operation of PeerHood is performed by the PeerHood daemon. PeerHood daemon is a background application, which takes care of the device and service discovery. Its responsibilities include maintaining a list of both remote and local services. Communication between PeerHood-enabled application and PeerHood daemon is handled using local socket interface provided by the PeerHood library. Applications can use this interface to search for remote devices and services and to register services to local PeerHood daemon. Daemon takes care of answering to service requests. 3.2 PeerHood plug-ins Different network technologies have been implemented as plug-ins, which can be loaded dynamically by other PeerHood components. Currently, network plug-ins have been implemented for Bluetooth, Wireless LAN and GPRS. Bluetooth offers several choices for data communications. First of all, data communications can be established directly on Logical Link Control and Adaptation (L2CAP) layer. L2CAP is the layer, which all data transmission rely on when using Bluetooth wireless technology. On top of L2CAP, RFCOMM protocol provides virtual serial port support, on top of which either OBEX or PPP connections can be established. OBEX is designed for exchange of small data objects, for example vcards. PPP provides

5 point to point IP connection between devices. However, another choice for IP connections over Bluetooth exists, namely Bluetooth Network Encapsulation protocol (BNEP), which offers IP connectivity directly on top of L2CAP without the need of RFCOMM layer. This provides smaller overhead and better network formation as RFCOMM/PPP combination. We have chosen direct L2CAP operation for Bluetooth connectivity in PeerHood. We can avoid additional overhead caused by either RFCOMM and PPP or BNEP, and still offer ordered and reliable data delivery. Wireless LAN (WLAN) and GPRS plug-ins for PeerHood both operate over IP connections. The difference between WLAN and GPRS plug-ins comes from the service discovery and connection establishment process. WLAN plug-in uses broadcast-based service discovery and offers direct connections between communicating devices without the need for additional devices. GPRS plug-in uses proxy device as an intermediary. Reason for requiring a proxy with GPRS usage is the usual practice from to provide only private non-reachable address for GPRS clients. The plug-ins have been named after the most appropriate network technology for the plug-in, although they are not strictly limited to those technologies. For example, WLAN plug-in can also be used on IP networks created by Bluetooth BNEP protocol, just by choosing the BNEP network interface. 3.3 PeerHood library Applications use the PeerHood library both to request information from the daemon and to connect to remote services. The PeerHood library is a software component, which can be dynamically loaded into an application. It provides an interface, which has all the required functions for PeerHood operation. Applications can register their own services to a local PeerHood service database, which is advertised to remote devices on request. Also, service discovery requests to local PeerHood daemon are sent using the PeerHood library. The library is also used to establish connections to remote services, and to transmit data between the devices. From the application point-of-view, connection establishment and data transmission process is transparent from the chosen network technology. To provide a common interface for several wireless technologies is a secondary objective of PeerHood, primary objective being the ability to monitor wireless neighborhood and to provide information about nearby devices and services. Furthermore, initial support for roaming between different wireless connections has been developed for PeerHood. 4. SERVICE DISCOVERY IN PEERHOOD Service discovery in PeerHood is query-based, and it s done by the PeerHood daemon. During initialization, the daemon loads configured network plug-ins, which start monitoring the wireless neighborhood for other PeerHood devices. When a new device is found, plug-in updates the device entry in the device database managed by the daemon. After that, device and service info can be requested from the device. Each network plug-in has slightly different ways to discover new PeerHood devices. Characteristics and

6 constraints of each wireless system have been taken into account, and the most suitable method has been selected. Bluetooth inquiry process and Service Discovery Protocol specified in Bluetooth wireless technology provides us means for discovering Bluetooth devices running PeerHood. We can use a specific Universally Unique Identifier (UUID) for PeerHood. When a device providing this Bluetooth service is found, it s known to be a PeerHood device. We can continue with PeerHood communication tasks. However, Since the Bluetooth service discovery is strongly connected to Bluetooth specification and technology itself, it s not feasible to use it when using other wireless technologies. Wireless LAN plug-in of the PeerHood uses single hop broadcast messages to find out other PeerHood devices. After starting to listen for replies, PeerHood daemon sends a broadcast message to a predefined port number. PeerHood devices in the same subnet receive the broadcast message and respond to it by sending unicast reply back to the source address. The devices, which responded to request, can be added to the local device database. The GPRS plug-in is configured to use a proxy, which forwards PeerHood device discovery requests to all connected devices. Likewise, replies to discovery requests are forwarded back to the requesting device. After receiving these replies, requesting device can add new remote devices to common device database. The GPRS plug-in is mainly intended for expanding the PeerHood neighborhood by creating Personal network [11] with pre-defined connections to favorite services. Other use is to provide supporting infrastructure-based technology for roaming between network technologies. 4.1 Service Registration In order to be found by other PeerHood devices, PeerHood application needs to register its service to the local PeerHood daemon. PeerHood daemon maintains a database of available devices and services. As service location information, a service entry includes the port to connect. Other information registered includes name of the service and the attributes. Currently, little research has been done on PeerHood Service descriptions, but service description templates and definitions are one of the future research areas of PeerHood. Initial survey of related research suggests, that in addition to common service description templates, a system should offer predefined set of typical services, to remove ambiguity regarding the service descriptions. Services should have also user-friendly, humanreadable forms, in case of manual service selection by the user. Service location protocol specification [6] defines service location information as universal resource locators (URL), which are of the form "service:"<srvtype>"://"<addrspec>. URL s are a well known form and therefore could be a good way to provide human-readable information about the service type and location.

7 4.2 Service Discovery Process After daemon has found neighboring PeerHood devices with the technology specific device discovery methods, common sequence of PeerHood service discovery can be carried out. The process of PeerHood service discovery and interaction is shown in Figure 2. To clarify the representation in the figure, the required step of device discovery is omitted. Operation of PeerHood daemon includes constant search for other PeerHood daemons in the neighborhood and sending of information requests to discovered devices. Requested information may include device info, service info, available network technologies and list of neighboring PeerHood devices already found by the target device. When starting up, the PeerHood application (client or server) initializes the PeerHood instance by creating a local socket connection to local PeerHood daemon. This connection is later used to register services to the daemon and to request the list of found devices and services from the daemon. As soon as PeerHood server application has registered its service to the daemon in its own device, that daemon responds to the arriving service discovery requests with the updated service list responses. This is depicted in the Figure 2 with two different service discovery responses sent by the daemon of Device 2. At first, before the registration of the PrintServer application, an empty service discovery response is sent, while after the registration the response includes updated service information with Print server service. Daemon constantly sends information requests to other PeerHood daemons found in the neighborhood. The contents and the time interval of the requests can be configured by the administrator of the device. For example, we might not need to request list of services every time we discover a certain device. Or, we might exclude the request for the list of neighbors from the information request, if we are interested only for devices and services found nearby. Device1 Device2 Application Daemon Daemon PrintServer GetInformation(deviceinfo, serviceinfo, networks, neighborlist) SendInformation(Device2, empty, bt+wlan, empty) RegisterService(Print) GetInformation(deviceinfo, serviceinfo, networks, neighborlist) GetServices(Print) SendInformation(Device2, Print, bt+wlan, empty) ServiceList Connect() Connection OK Data exchange with server Disconnect() Disconnect OK Figure 2 - Service Discovery and Interaction in PeerHood

8 After the daemon has received information from remote PeerHood devices, it updates device and service information in the local device and service database, managed by the daemon itself. The information is ready to be supplied to the local PeerHood applications. Applications can query a list of all discovered devices and services, or devices providing certain service. Daemon returns the list of locations of requested services. These requests are done using the local socket connection, established during initialization. All the communication between PeerHood application and Daemon is done by using functions provided by the PeerHood library. Also connection establishment and data exchange between PeerHood applications is done using the PeerHood library. Daemon and library uses network plug-ins as an actual component communicating with other devices. PeerHood has been designed to utilize extended neighborhood information, which includes the exchange of stored device and service information between neighboring PeerHood devices [12]. Neighborhood information can be used to synchronize the device databases between different devices. It diminishes the influence of failed device discovery attempts, and it can be used also to devote specific device (e.g. personal computer) to perform device and service discoveries on behalf of mobile device. This is carried out in the regular device discovery process, with requesting the list of neighbors in the information request sent between daemons. 4.4 Service Interaction Of the service selection approaches presented by Tyan [9], we have chosen to define an interface as the method for service interaction in PeerHood. For each PeerHood service, the service discovery process results to a location of the service. Location information includes reference to PeerHood plug-in which can be used to connect to device, the technology specific addresses of the remote device, and the port for the target service. Connection establishment based on retrieved location information is done automatically by the PeerHood library. Upon a successful connection, the library returns a connected interface reference to the application. As for the service selection mechanism, PeerHood library provides both automatic and manual ones. Application developers may choose whichever is more suitable. Automatic service selection is done by ordering the PeerHood interface to connect to a desired service type. Manual selection can be done by requesting a list of service entries of certain type from the PeerHood daemon, and selecting the most suitable one from the list. By providing two different methods for service selection, we can overcome the inconvenience caused by the manual service selection, but offer a manual selection when necessary. 5. CONCLUSION Service discovery is a fundamental part of future network environment. Wireless connectivity places service discovery in an important role. This is even more emphasized in ad hoc connections, with no possibility for permanent centralized directory for services.

9 We have developed PeerHood, a system for ad hoc networking, providing connections using different wireless network technologies: Bluetooth, Wireless LAN and GPRS. To address the important issue of service discovery in wireless networks, a device and service discovery process has been implemented as one of the central activities of PeerHood. This process considers different requirements and possibilities of wireless network technologies, and provides the most suitable ways of discovering other devices and services. PeerHood also includes a common interface, which can be used to interact with found services, regardless of the underlying network technology. We have chosen to offer both automatic and manual service selection. This enables both convenient automatic service selection of common services, and on the other hand, more exact manual service selection, if service type requires accurate consideration of service attributes, or if the service attributes include ambiguous information. REFERENCES [1] Arbanowski, S. et al., I-centric Communications: personalization, ambient awareness, and adaptability for future mobile services. IEEE Communications Magazine, volume 42, Issue 9, pp , [2] Tafazolli, R. (ed.), Technologies for the Wireless Future: Wireless World Research Forum. John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, England, [3] Sun Microsystems, Jini Technology Core Platform Specification, from [4] UPnP Forum. UPnP Device Architecture. Document version 1.0.1, July 2006, from [5] Bluetooth SIG. Specification for Bluetooth technology. version 1.1, [6] Guttman, E. et al., Service Location Protocol, Version 2. RFC 2608, from [7] Clement, UDDI Version 3.0.2, from [8] Zhu, F. et al., Service Discovery in Pervasive Computing Environments. IEEE Pervasive Computing, Volume 4, Issue 4, pp , [9] Tyan, J. and Mahmoud, Q. H., A comprehensive service discovery solution for mobile ad hoc networks. Mobile Networks and Applications, Volume 10, Issue 4, pp , [10] Porras, J. et al., Peer-to-peer Communication Approach for a Mobile Environment. 37th Annual Hawaii International Conference on System Sciences, [11] Niemegeers, I. G. and Heemstra de Groot, S. M., From Personal Area Networks to Personal Networks: A User Oriented Approach. Wireless Personal Communications: An International Journal, Volume 22, Issue 2, pp , [12] Hämäläinen, A. and Porras, J., Enhancing Mobile Peer-to-Peer Environment with Neighborhood Information. Proceedings of the 3rd Workshop on Applications of Wireless Communications. Lappeenranta, Finland, pp , 2005.

Peer-to-peer Communication Approach for a Mobile Environment

Peer-to-peer Communication Approach for a Mobile Environment Peer-to-peer Communication Approach for a Mobile Environment Jari Porras, Petri Hiirsalmi and Ari Valtaoja Lappeenranta University of Technology P.O. Box 20 53851 Lappeenranta Finland {Jari.Porras, Petri.Hiirsalmi,

More information

Service Discovery in Pervasive Computing Environments

Service Discovery in Pervasive Computing Environments Service Discovery in Pervasive Computing Environments Presented by Jamal Lewis and Shruti Pathak CS 570 Computer Networks Instructor Dr. Feng Zhu Introduction What is it? Pervasive Computing Environments

More information

Personal Trusted Device in Personal Communications

Personal Trusted Device in Personal Communications Personal Trusted Device in Personal Communications Jari Porras, Pekka Jäppinen, Petri Hiirsalmi, Arto Hämäläinen, Sami Saalasti, Raine Koponen and Satu Keski-Jaskari Laboratory of Communications Engineering

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

JESA Service Discovery Protocol

JESA Service Discovery Protocol JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

mslp - Mesh-enhanced Service Location Protocol Λ

mslp - Mesh-enhanced Service Location Protocol Λ mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao and Henning Schulzrinne Department of Computer Science Columbia University, New York, NY 10027 fzwb, hgsg@cs.columbia.edu Abstract The Service

More information

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation.

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation. SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Ritesh Mehta Department of Computer Science and Engineering The University of Texas at Arlington mehta@cse.uta.edu Abstract Advent of mobile and wireless computing

More information

Design and Implementation of a Service Discovery Architecture in Pervasive Systems

Design and Implementation of a Service Discovery Architecture in Pervasive Systems Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as

More information

CptS 464/564 Lecture 18

CptS 464/564 Lecture 18 CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems

More information

Chapter 1. Introduction. 1.1 Understanding Bluetooth as a Software Developer

Chapter 1. Introduction. 1.1 Understanding Bluetooth as a Software Developer Chapter 1 Introduction Bluetooth is a way for devices to wirelessly communicate over short distances. Wireless communication has been around since the late nineteenth century, and has taken form in radio,

More information

Comparative Study of Service Discovery Protocols for ad-hoc Networks

Comparative Study of Service Discovery Protocols for ad-hoc Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 156 Comparative Study of Service Discovery Protocols for

More information

A Service Browser for the Service Location Protocol Version 2 (SLPv2)

A Service Browser for the Service Location Protocol Version 2 (SLPv2) A Browser for the Location Protocol Version 2 (SLPv2) Eivind Jåsund, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM) Institute of Communication Networks D 80290

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

FILE TRANSFER PROFILE

FILE TRANSFER PROFILE Part K:12 FILE TRANSFER PROFILE This application profile defines the application requirements for Bluetooth devices necessary for the support of the File Transfer usage model. The requirements are expressed

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Better Approach To Mobile Adhoc Networking

Better Approach To Mobile Adhoc Networking Better Approach To Mobile Adhoc Networking batman-adv - Kernel Space L2 Mesh Routing Martin Hundebøll Aalborg University, Denmark March 28 th, 2014 History of batman-adv The B.A.T.M.A.N. protocol initiated

More information

Cisco Wide Area Bonjour Solution Overview

Cisco Wide Area Bonjour Solution Overview , page 1 Topology Overview, page 2 About the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), page 5 The Cisco Wide Area Bonjour solution is based on a distributed and hierarchical

More information

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

A Tutorial on The Jini Technology

A Tutorial on The Jini Technology A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple

More information

Internet Services & Protocols. Mobile and Wireless Networks

Internet Services & Protocols. Mobile and Wireless Networks Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

mslp - Mesh-enhanced Service Location Protocol Λ

mslp - Mesh-enhanced Service Location Protocol Λ mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao y, Henning Schulzrinne y and Erik Guttman z y Columbia University fzwb,hgsg@cs.columbia.edu z Sun Microsystems erik.guttman@germany.sun.com

More information

Towards a communication agnostic middleware for Ambient Intelligence

Towards a communication agnostic middleware for Ambient Intelligence Towards a communication agnostic middleware for Ambient Intelligence David Sainz 1, Aitor Almeida 1, Jon Valdés 2, Diego Lopez de Ipiña 1 Mobility Research Lab More Lab University of Deusto Avenida de

More information

UPnP Services and Jini Clients

UPnP Services and Jini Clients UPnP Services and Jini Clients Jan Newmarch School of Network Computing Monash University jan.newmarch@infotech.monash.edu.au Abstract UPnP is middleware designed for network plug and play. It is designed

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

Binding information contains the entries in the mobility binding table.

Binding information contains the entries in the mobility binding table. GLOSSARY Numerics 802.11b/g An IEEE specification for a wireless LAN airlink. A agent advertisement agent discovery agent solicitation An advertisement message constructed by attachment of a special extension

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Networking 2. IP over Bluetooth

Networking 2. IP over Bluetooth Networking 2 IP over Bluetooth IP over Bluetooth Part 1: Setup Connect your Pis directly to the monitor, keyboard, and mouse, login, and start X No VNC or SSH connections We will make a point-to-point

More information

Adding Unusual Transports to The Serval Project

Adding Unusual Transports to The Serval Project Adding Unusual Transports to The Serval Project Alexandros Tsiridis & Joseph Hill Supervised by: Dr. Paul Gardner-Stephen The Serval Project Serval is a telecommunications system comprised of at least

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

05 Indirect Communication

05 Indirect Communication 05 Indirect Communication Group Communication Publish-Subscribe Coulouris 6 Message Queus Point-to-point communication Participants need to exist at the same time Establish communication Participants need

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CONTROLLING PC THROUGH MOBILE PHONE MISS. MUKTA N. PATIL, PROF. SHEETAL P. GAWANDE

More information

Internet of Things Bill Siever. New Applications. Needs. Wearables. Embedded Smarts. Simple to Setup. Networking w/ Long Battery Life (Low Power)

Internet of Things Bill Siever. New Applications. Needs. Wearables. Embedded Smarts. Simple to Setup. Networking w/ Long Battery Life (Low Power) Internet of Things Bill Siever New Applications Wearables Embedded Smarts Needs Simple to Setup Networking w/ Long Battery Life (Low Power) Solution: BLE A.K.A. Bluetooth Smart or Bluetooth Low Energy

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

BLUETOOTH PAN and external IP networks

BLUETOOTH PAN and external IP networks BLUETOOTH PAN and external IP networks 1 Tore E. ]j1jnvik, 2Paal Engelstad & 2 Do van Thanh 1. Unik - University of Oslo - Norway - tlf: +47 90199176 - torejoen@iji.uio.no 2. Telenor R&D - Norway - tif:

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55 Review paper on performance analysis of AODV, DSDV, OLSR on the basis

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

IrDA INTEROPERABILITY

IrDA INTEROPERABILITY Part F:2 IrDA INTEROPERABILITY The IrOBEX protocol is utilized by the Bluetooth technology. In Bluetooth, OBEX offers same features for applications as within the IrDA protocol hierarchy and enabling the

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

WiZNet Integration of different Web service Registries

WiZNet Integration of different Web service Registries WiZNet Integration of different Web service Registries Technical University of Vienna Information Systems Institute Distributed Systems Group Schahram Dustdar and Martin Treiber dustdar@infosys.tuwien.ac.at

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Configuring IGMP Snooping

Configuring IGMP Snooping This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites

More information

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Infrastructure for Autonomous Mobile Robots Communication and Coordination 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

Configuring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election

Configuring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election Contents Configuring MLD 1 Overview 1 MLD versions 1 How MLDv1 operates 1 How MLDv2 operates 3 MLD message types 4 MLD SSM mapping 7 MLD proxying 8 Protocols and standards 9 MLD configuration task list

More information

Using Cisco Discovery Protocol

Using Cisco Discovery Protocol Using Cisco Discovery Protocol First Published: February 1, 1995 Last Updated: August 12, 2010 Cisco Discovery Protocol (CDP) is a Layer 2 media-independent and network-independent protocol that runs on

More information

Jini Technology Overview

Jini Technology Overview Jini Technology Overview Bob Scheifler Senior Staff Engineer Sun Microsystems, Inc Talk outline very brief Jini overview Jini lookup service in some depth service types and type matching attributes and

More information

Some Notes on Security in the Service Location Protocol Version 2 (SLPv2)

Some Notes on Security in the Service Location Protocol Version 2 (SLPv2) Some Notes on Security in the Service Location Protocol Version 2 (SLPv2) Marco Vettorello, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM), Institute of Communication

More information

Deploying LISP Host Mobility with an Extended Subnet

Deploying LISP Host Mobility with an Extended Subnet CHAPTER 4 Deploying LISP Host Mobility with an Extended Subnet Figure 4-1 shows the Enterprise datacenter deployment topology where the 10.17.1.0/24 subnet in VLAN 1301 is extended between the West and

More information

The Jini architecture. Johan Petrini and Henning Sundvall

The Jini architecture. Johan Petrini and Henning Sundvall The Jini architecture Johan Petrini and Henning Sundvall Distributed Systems Fall 2002 Abstract A technology has been developed that exemplifies a new approach to the architecture of computing systems.

More information

Bluetooth low energy technology Bluegiga Technologies

Bluetooth low energy technology Bluegiga Technologies Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background

More information

Universal Communication Component on Symbian Series60 Platform

Universal Communication Component on Symbian Series60 Platform Universal Communication Component on Symbian Series60 Platform Róbert Kereskényi, Bertalan Forstner, Hassan Charaf Department of Automation and Applied Informatics Budapest University of Technology and

More information

Table of Contents 1 IGMP Configuration 1-1

Table of Contents 1 IGMP Configuration 1-1 Table of Contents 1 IGMP Configuration 1-1 IGMP Overview 1-1 IGMP Versions 1-1 Introduction to IGMPv1 1-2 Enhancements in IGMPv2 1-3 Enhancements in IGMPv3 1-4 IGMP SSM Mapping 1-5 Protocols and Standards

More information

GVDS Assets. Design Alternatives

GVDS Assets. Design Alternatives GVDS Assets In coordination models exploiting the notion of GVDS: The association between the coordination context contributed by a given agent and the agent itself is now made explicit The resulting style

More information

Energy-efficient Middleware-layer Multi-radio Networking: An Assessment in the Area of Service Discovery

Energy-efficient Middleware-layer Multi-radio Networking: An Assessment in the Area of Service Discovery Energy-efficient Middleware-layer Multi-radio Networking: An Assessment in the Area of Service Discovery Damien Charlet LIFC University of Franche-Comté Valérie Issarny, Rafik Chibout ARLES project-team

More information

Service Discovery and Name Resolution Architectures for On-Demand MANETs

Service Discovery and Name Resolution Architectures for On-Demand MANETs Service Discovery and Name Resolution Architectures for On-Demand MANETs Paal Engelstad, Yan Zheng, Tore Jønvik, Do Van Thanh University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad,

More information

APPLYING WIRELESS COMMUNICATION TECHNOLOGY TO FITNESS DEVICES

APPLYING WIRELESS COMMUNICATION TECHNOLOGY TO FITNESS DEVICES APPLYING WIRELESS COMMUNICATION TECHNOLOGY TO FITNESS DEVICES Satu Keski-Jaskari Lappeenranta University of Technology P.O.Box 20, 53851 Lappeenranta, Finland Satu.Keski-Jaskari@lut.fi Pekka Jäppinen Lappeenranta

More information

Table of Contents Chapter 1 Multicast Routing and Forwarding Configuration

Table of Contents Chapter 1 Multicast Routing and Forwarding Configuration Table of Contents Table of Contents... 1-1 1.1 Multicast Routing and Forwarding Overview... 1-1 1.1.1 Introduction to Multicast Routing and Forwarding... 1-1 1.1.2 RPF Mechanism... 1-2 1.1.3 Multicast

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3. Introduction to Multicast listener discovery protocol () is used by an IPv6 router to discover the presence of multicast listeners on directly-attached subnets. Multicast listeners are nodes wishing to

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Implementation of Broadcasting System Using Bluetooth

Implementation of Broadcasting System Using Bluetooth Implementation of Broadcasting System Using Bluetooth E.Srinivas Assistant Professor Department of Electronics and Communication Engineering Anurag group of institutions, hyderabad, Andhra pradesh, India

More information

A Jini Based Implementation for Best Leader Node Selection in MANETs

A Jini Based Implementation for Best Leader Node Selection in MANETs A Jini Based Implementation for Best Leader Node Selection in MANETs Monideepa Roy, Pushpendu Kar and Nandini Mukherjee Abstract MANETs provide a good alternative for handling the constraints of disconnectivity

More information

Finding Support Information for Platforms and Cisco IOS Software Images

Finding Support Information for Platforms and Cisco IOS Software Images First Published: June 19, 2006 Last Updated: June 19, 2006 The Cisco Networking Services () feature is a collection of services that can provide remote event-driven configuring of Cisco IOS networking

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Multi-Layer Clusters in Ad-hoc Networks - An Approach to Service Discovery

Multi-Layer Clusters in Ad-hoc Networks - An Approach to Service Discovery Multi-Layer Clusters in Ad-hoc Networks - An Approach to Service Discovery Michael Klein and Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe D-76128 Karlsruhe,

More information

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity

On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity On-Demand BlueTooth: Experience integrating BlueTooth in Connection Diversity Jean Tourrilhes Mobile and Media Systems Laboratory HP Laboratories Palo Alto HPL-2003-51 March 17 th, 2003* E-mail: jt@hpl.hp.com

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Interdomain Routing Design for MobilityFirst

Interdomain Routing Design for MobilityFirst Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts

GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts GWNMS NeDi This section reviews the GroundWork Monitor NMS NeDi. About NeDi NeDi is an open source toolkit for managing network infrastructure devices such as switches and routers, and is integrated into

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery About, page 1 Prerequisites for, page 2 Guidelines for, page 2 Defaults for, page 4 Configure, page 5 View and Clear Dynamically Discovered Neighbors, page 10 History for, page 11 About The IPv6 neighbor

More information

Service Advertisement and Discovery:

Service Advertisement and Discovery: INDUSTRY SURVEY Service Advertisement and Discovery: Enabling Universal Device Cooperation GOLDEN G. RICHARD III University of New Orleans Service advertisement and discovery technologies enable device

More information

Module 7 Implementing Multicast

Module 7 Implementing Multicast Module 7 Implementing Multicast Lesson 1 Explaining Multicast Why Multicast? Used when sending same data to multiple receivers Better bandwidth utilization Less host/router processing Used when addresses

More information

OBEXSender 2. User Guide. Version 2.4. M o n d a y, February 0 5,

OBEXSender 2. User Guide. Version 2.4. M o n d a y, February 0 5, OBEXSender 2 User Guide Version 2.4 M o n d a y, February 0 5, 2 0 0 7 Copyright 2000-2007 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for any errors, which

More information

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea Address Auto uto- configuration for Wireless Mesh Networks Keecheon Kim Konkuk University Seoul, Korea kckim@konkuk.ac.kr Contents Wireless Mesh Networks Auto- configuration Topics In Autoconf WG Proposed

More information

DTV for Personalized Mobile Access and Unified Home Control

DTV for Personalized Mobile Access and Unified Home Control DTV for Personalized Mobile Access and Unified Home Control Jianlin Guo, Fernando Matsubara, Johnas Cukier, Haosong Kong Mitsubishi Electric Research Labs, 558 Central Avenue, Murray Hill, NJ 07974, USA

More information

DIAL-UP NETWORKING PROFILE

DIAL-UP NETWORKING PROFILE Part K:7 DIAL-UP NETWORKING PROFILE This profile defines the requirements for Bluetooth devices necessary for the support of the Dial-up Networking use case. The requirements are expressed in terms of

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

universaal Architecture and The Resource Discovery

universaal Architecture and The Resource Discovery universaal Architecture and The Resource Discovery Michele Girolami ISTI-CNR Wireless Network Lab. Departimento di Informatica Università Pisa 1 Outline 1. Ambient Intelligence and AAL 2. The universaal

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Service Recommendation using SLP

Service Recommendation using SLP Service Recommendation using SLP Evan Hughes, David McCormack, Michel Barbeau, and Francis Bordeleau Carleton University, School of Computer Science 1125 Colonel By Drive Ottawa, ON Canada K1S 5B6 Email:

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

RFCOMM with TS 07.10

RFCOMM with TS 07.10 Part F:1 Serial Port Emulation This document specifies the RFCOMM protocol by specifying a subset of the ETSI TS 07.10 standard, along with some Bluetooth-specific adaptations BLUETOOTH SPECIFICATION Version

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information